Written by: ETHGlobal
Compiled by: Frank, Foresight News
From September 22 to 24, ETHGlobal held the ETHGlobal New York Hackathon in New York. A total of 13 projects were shortlisted for the finals, covering blockchain gaming infrastructure, Telegram robots, AI, cross-chain interoperability and other fields.
There are many interesting innovative projects among them, including F.A.S.T., a Telegram transfer robot that supports photo recognition, ConsciousNFT, which intelligently creates background stories for NFTs, A.S.R., which allows users to restore their smart contract ownership after losing their signature private key, etc. This article will briefly introduce the shortlisted projects.
FRAMED!
FRAMED! is a fully on-chain and trustless hidden information game (Mafia) built on fhEVM, where an art thief steals a painting from a museum and players are randomly assigned roles such as citizens, thieves, police officers, or detectives. The goal of the game is for the thieves to eliminate the citizens, while the citizens work together to identify and vote out the hidden thieves, requiring discussion and social reasoning between players, and must cooperate and deceive each other.
What makes this game unique is its ability to store encrypted state directly on-chain, and fully homomorphic encryption (FHE) smart contracts allow computations to be performed on encrypted data without decryption. This innovation addresses privacy limitations and guarantees.
F.A.S.T.
F.A.S.T. is a Telegram robot that uses image indexing technology, allowing users to take a photo of themselves to register, and then transfer money to someone's wallet address through other people's portraits (in the form of group photos, etc.).
ZeroTrustBounty
ZeroTrustBounty aims to address the challenges of traditional bug bounty platforms - companies must trust third parties with sensitive data, and white hat hackers cannot guarantee payment for their services, which means that white hat hackers may report a vulnerability to a bug bounty program but not get paid.
ZeroTrustBounty solves this problem by using TLS notarization and the Lit protocol. Suppose there is a SQL injection vulnerability, ZeroTrustBounty allows white hat hackers to hide the attacking HTTP requests but display the cryptographically verified HTTP responses so that affected companies can cryptographically verify the white hat hacker's report and understand its impact.
For payment, ZeroTrustBounty uses the Lit protocol to encrypt HTTP requests/responses, and can only be decrypted by the enterprise after paying to a certain address or holding NFT. This ensures payment if the enterprise intends to fix the vulnerability, and eliminates the problem of white hat hackers not getting paid or third-party services stealing vulnerability techniques/reports. It also solves the problem of enterprises disclosing sensitive information to third-party services.
Doom Arena
Doom Arena is a distributed DApp for managing and creating game competitions, allowing developers to host competitions to provide solutions, provide incentives for players, and generate revenue for developers. It introduces a novel approach to hosting game competitions using the original Doom game as an example.
These tournaments are completely blockchain-based and decentralized, creating a new avenue for the game developer economy, where game developers and influencers can launch tournaments through their games and offer attractive prize pools to incentivize participation.
The host starts the competition by funding APE tokens as the initial prize pool, and players will use their ENS profile to log in and pay APE to buy tickets to enter the competition. 90% of the funds are used to increase the prize pool, while 10% belongs to the host. On average, the host can recover the cost after 100 players pay for tickets to participate in the competition.
In short, the project creates a decentralized platform for hosting game competitions, provides innovative ways for game developers to promote their works and attract players, and establishes a sustainable game promotion economic model. Anyone can initiate or participate in competitions and contribute to a vibrant game ecosystem.
AirTracker
AirTracker uses AirTags and blockchain to store and deliver messages for decentralized physical asset tracking. It first captures the location data of each AirTag asset through an Apple device and stores it on the chain and IPFS. Location updates are also sent via XMTP and use AirStack for ENS lookups.
Users can log in to the Web UI to view the historical location of each asset on a map, as well as specific time and location updates. Users can also share asset locations with anyone or any application by simply sharing a randomly generated tag name (also known as a location encryption key).
SafeCreate2
SafeCreate2 uses single-chain Safe to protect multi-chain smart contract deployment, allowing Safe on a single chain to deploy smart contracts to the same address on all chains without bridging ETH. It also allows single-chain Safe to perform management functions on any multi-chain contract.
It uses Axelar to send and receive cross-chain messages to ensure that there are no address conflicts and that each Safe on each chain receives a unique deployment namespace. It also implements a CrossChainOwnable contract that applications using the tool can inherit, allowing multi-chain contracts to be securely managed by Safe on a single chain.
ConsciousNFT
ConsciousNFT is an AI tool for NFT projects that awakens conscious identity in NFTs. It provides NFT project founders and owners with an AI engine toolset to jointly build a rich internal world, giving NFT artworks unique personality, background story, dialogue ability and narrative depth, becoming conscious characters.
These include creating challenges and quests where NFTs can be competed for and rewarded with generative NFTs; and writing interactive narratives where you can build relationships, engage in battles, or find adventures within sentient NFTs.
With ConsciousNFT, users can mint trained LLM models onto the blockchain to preserve interactive personas of NFTs, giving each PFP a conversational personality, empowering PFPs to cultivate fan bases, transforming static NFT art into sentient digital characters, and more.
Space Guardians
Space Guardians aims to develop a security solution for the social private key recovery solution MetaMask Snaps + Cryptosat Satellites to solve the management issues of notifications and audit trails, thereby reducing the possibility of collusion among Guardians.
It uses the MetaMask Snaps framework and integrates it with the backend API of the Cryptosat Satellites digital twin (lab/test environment) for storage and event auditing, and the repository includes both the frontend web product and the backend API.
A.S.R.
A.S.R. (Anti Social Recovery) is a design pattern that allows users to recover ownership of their smart contracts after losing their signing private keys.
It allows users to deploy smart contracts whose ownership is linked to their unique proof of personhood (e.g. World ID). After verification using World ID, users can deploy contracts and then take over ownership from different EOAs.
This design pattern can be extended to many different use cases and is applicable to any smart contract role (Minter, Pauser, Burner, etc.). In addition, World ID can be exchanged with different proof-of-personality providers, and we also consider how it can be applied to ERC20 tokens, allowing users to claim balances from new addresses.
Currently supported operations include:
Log in using your wallet;
Verify personality using World ID;
Deploy smart contracts as the owner;
Import existing smart contracts;
Transferring smart contract ownership to a new EOA address owned by the World ID holder;
MEVictim Rebate
MEVictim Rebate designs better market incentives by using historical on-chain data to identify MEV victims and airdropping them an ERC-721 token to access a token-gated Uniswap v4 pool on Scroll.
Specifically, the project will identify MEV victims on ETH Goerli and grant them an ERC-721 token that will make holders eligible for rebates when they provide liquidity to the Uniswap v4 pool on Scroll. Ultimately, the project will incentivize better Scroll interaction behavior based on users' historical chain data on ETH Goerli.
A subgraph of ETH Goerli transactions is used to identify MEV victims (individuals who were front-runners, sandwich attacks, etc.). The transaction hash and log ID are then provided as input to the Axiom circuit.
The Axiom circuit uses transaction hashes to prove whether the wallet address is indeed a victim of the MEV attack. If the conditions are met, the corresponding wallet address will receive an ERC-721 token, which can then be bridged to Scroll.
RealReturn
RealReturn is an open leaderboard of verified real investment returns that enables anyone to publicly prove their investment returns without sharing their credentials with anyone or anywhere.
It uses cryptography such as third-party TLS, MPC, etc. to handle TLS sessions between users and application servers, so even though the content of the session is still only visible to the user and the application server, the notary can generate something on the side to prove that the record has not been tampered with.
Abstract Wallet
Abstract Wallet uses Solidity FCL to implement WebAuthn-driven Userop. Users only need a smartphone to use the account abstraction function with a key to achieve instant click login for users.
Users can generate key credentials, smart accounts, and mint NFTs with just one click, and when users click to create an account, it will generate a FIDO key using the biometric function of the smartphone.
The FIDO key is stored in the smartphone’s vault, providing protection for the private key (unlike in browsers where it is stored in an insecure memory area), and the public key derived from the key credential is pushed to the main contract on the chain, where subsequent transactions will use this key for authentication.
XSafe
XSafe optimizes Gnosis Safe’s multi-signature process for cross-chain use, with the core goal of reducing the time and complexity involved in performing the same management functions on multiple blockchain networks.
Users only need to sign once, and the signature is automatically propagated to all linked blockchain networks to execute a single transaction across multiple networks. The workflow includes:
Initialization: Users integrate X-Safe as a custom module through Gnosis Safe UI (one-time setup);
Create transactions: Users or administrators create transactions that need to be executed across multiple blockchain networks;
Signature generation: Users sign transactions with their private keys through the X-Safe interface;
Signature propagation: X-Safe propagates the generated signature to the corresponding Gnosis Safe contracts on all integrated blockchains;
Transaction execution: Once the required number of signatures are collected, X-Safe triggers the execution of transactions on all chains simultaneously or sequentially according to user settings;